Analysis

  • max time kernel
    15s
  • max time network
    113s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 14:24

General

  • Target

    equil/Equil.exe

  • Size

    315KB

  • MD5

    1072ebb6213cc03ac9e95ba8d9e64e0d

  • SHA1

    9f55afff7552396fb06ef40b20a0758a1696e24a

  • SHA256

    9bb70607d34ec9888aeda348c1dfa7984d5365586115e0fa6bd0fbf221f6d48b

  • SHA512

    6cdc9c53ae2d5195a94338e470ad670dbbc0f65254bc4ab16c21bf4d15ff94c6760de807341ade5c651f1c87a429fea80aab57f72afa5d3ab285102385b72001

  • SSDEEP

    3072:WUmTM6EWxDNq4h1SsiupSnq02qRwffb+BqFoDmE70G00QRy1mZ6MXHsFC6fzBjDb:MEYtjSsiupKwfohDRsXNVK

Score
8/10

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 3 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 36 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 22 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\equil\Equil.exe
    "C:\Users\Admin\AppData\Local\Temp\equil\Equil.exe"
    1⤵
    • Checks computer location settings
    • Enumerates connected drives
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell_ise.exe" àâæçèêëïîôœ€àâæàâæê
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:5756
    • C:\Windows\System32\wbem\WMIC.exe
      "C:\Windows\System32\wbem\WMIC.exe" process where name='explorer.exe' delete
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2244
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.roblox.com/users/3456785112/profile https://www.youtube.com/watch?v=p_SWXJvF1vw https://www.youtube.com/watch?v=p_SWXJvF1vw https://www.roblox.com/users/2200940330/profile https://www.roblox.com/users/2200940330/profile
      2⤵
        PID:2168
      • C:\Windows\System32\dfrgui.exe
        "C:\Windows\System32\dfrgui.exe"
        2⤵
          PID:3744
        • C:\Windows\System32\CloudNotifications.exe
          "C:\Windows\System32\CloudNotifications.exe"
          2⤵
            PID:1640
          • C:\Windows\System32\tabcal.exe
            "C:\Windows\System32\tabcal.exe" /4
            2⤵
              PID:1100
            • C:\Windows\System32\mstsc.exe
              "C:\Windows\System32\mstsc.exe" -v Iæêgæêd_æêîæêî_alloca
              2⤵
                PID:5412
              • C:\Program Files\Common Files\microsoft shared\ink\mip.exe
                "C:\Program Files\Common Files\microsoft shared\ink\mip.exe"
                2⤵
                  PID:1644
                • C:\Program Files\Common Files\microsoft shared\ink\mip.exe
                  "C:\Program Files\Common Files\microsoft shared\ink\mip.exe"
                  2⤵
                    PID:3208
                  • C:\Windows\System32\msinfo32.exe
                    "C:\Windows\System32\msinfo32.exe" <
                    2⤵
                      PID:5188
                    • C:\Windows\System32\msiexec.exe
                      "C:\Windows\System32\msiexec.exe" <
                      2⤵
                        PID:1516
                      • C:\Windows\System32\msra.exe
                        "C:\Windows\System32\msra.exe" <
                        2⤵
                          PID:3480
                        • C:\Windows\System32\wusa.exe
                          "C:\Windows\System32\wusa.exe" <
                          2⤵
                            PID:4188
                          • C:\Windows\System32\mspaint.exe
                            "C:\Windows\System32\mspaint.exe" <
                            2⤵
                              PID:3416
                            • C:\Windows\System32\recdisc.exe
                              "C:\Windows\System32\recdisc.exe" <
                              2⤵
                                PID:4368
                              • C:\Windows\System32\bdeunlock.exe
                                "C:\Windows\System32\bdeunlock.exe" <
                                2⤵
                                  PID:3208
                                • C:\Windows\System32\msinfo32.exe
                                  "C:\Windows\System32\msinfo32.exe" <
                                  2⤵
                                    PID:2324
                                  • C:\Windows\System32\msiexec.exe
                                    "C:\Windows\System32\msiexec.exe" <
                                    2⤵
                                      PID:2716
                                    • C:\Windows\System32\msra.exe
                                      "C:\Windows\System32\msra.exe" <
                                      2⤵
                                        PID:4904
                                      • C:\Windows\System32\mspaint.exe
                                        "C:\Windows\System32\mspaint.exe" <
                                        2⤵
                                          PID:4760
                                        • C:\Windows\System32\wusa.exe
                                          "C:\Windows\System32\wusa.exe" <
                                          2⤵
                                            PID:2512
                                          • C:\Windows\System32\recdisc.exe
                                            "C:\Windows\System32\recdisc.exe" <
                                            2⤵
                                              PID:5136
                                            • C:\Windows\System32\bdeunlock.exe
                                              "C:\Windows\System32\bdeunlock.exe" <
                                              2⤵
                                                PID:5228
                                            • C:\Windows\system32\AUDIODG.EXE
                                              C:\Windows\system32\AUDIODG.EXE 0x40c 0x38c
                                              1⤵
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:4176
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                              • Modifies Installed Components in the registry
                                              • Enumerates connected drives
                                              • Checks SCSI registry key(s)
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of FindShellTrayWindow
                                              • Suspicious use of SendNotifyMessage
                                              PID:4168
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:5844
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=17 --mojo-platform-channel-handle=5068 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:1
                                                1⤵
                                                  PID:228
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=18 --mojo-platform-channel-handle=3944 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:1
                                                  1⤵
                                                    PID:6036
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --mojo-platform-channel-handle=4180 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:1
                                                    1⤵
                                                      PID:4612
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=20 --mojo-platform-channel-handle=4984 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:1
                                                      1⤵
                                                        PID:3752
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=21 --mojo-platform-channel-handle=4332 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:1
                                                        1⤵
                                                          PID:556
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --mojo-platform-channel-handle=5732 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:1
                                                          1⤵
                                                            PID:2560
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=6076 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
                                                            1⤵
                                                              PID:3900
                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                              1⤵
                                                                PID:784
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=24 --mojo-platform-channel-handle=6360 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:1
                                                                1⤵
                                                                  PID:3180
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
                                                                  1⤵
                                                                    PID:6068
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6676 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
                                                                    1⤵
                                                                      PID:5480
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5228 --field-trial-handle=2280,i,1836084024518340990,18250262151825427757,262144 --variations-seed-version /prefetch:8
                                                                      1⤵
                                                                        PID:6468

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_labm5vs2.fnr.ps1

                                                                        Filesize

                                                                        60B

                                                                        MD5

                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                        SHA1

                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                        SHA256

                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                        SHA512

                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                      • C:\Windows\Debug\WIA\wiatrace.log

                                                                        Filesize

                                                                        1KB

                                                                        MD5

                                                                        745ad78231d29682d28e0465eb60765a

                                                                        SHA1

                                                                        127d64a2f3f0705b5976a7dc33450609ef5c7b26

                                                                        SHA256

                                                                        bf095dd7762f5a51d1393d47ab8fd582dfdae045ff06b01364c36204d3604169

                                                                        SHA512

                                                                        c6125b6a44d622c3fd4247c9528832933b2d2912df68679e6b1f0369fe64bac656a3e2e5722d35504748068c8675bbb171a9d60552ee8307080828e62b063a8b

                                                                      • memory/784-17-0x000001C4ACEE0000-0x000001C4ACF00000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/784-38-0x000001C4ACEA0000-0x000001C4ACEC0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/784-44-0x000001C4AD4C0000-0x000001C4AD4E0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/784-12-0x000001C4ABF40000-0x000001C4AC040000-memory.dmp

                                                                        Filesize

                                                                        1024KB

                                                                      • memory/4152-190-0x00007FF6A4AD0000-0x00007FF6A4B3A000-memory.dmp

                                                                        Filesize

                                                                        424KB

                                                                      • memory/4152-0-0x00007FF6A4AD0000-0x00007FF6A4B3A000-memory.dmp

                                                                        Filesize

                                                                        424KB

                                                                      • memory/4168-11-0x0000000003E60000-0x0000000003E61000-memory.dmp

                                                                        Filesize

                                                                        4KB

                                                                      • memory/5756-159-0x00000165F9810000-0x00000165F9818000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/5756-10-0x00000165FAD00000-0x00000165FAD38000-memory.dmp

                                                                        Filesize

                                                                        224KB

                                                                      • memory/5756-7-0x00000165FAD50000-0x00000165FAD9A000-memory.dmp

                                                                        Filesize

                                                                        296KB

                                                                      • memory/5756-2-0x00000165DC500000-0x00000165DC538000-memory.dmp

                                                                        Filesize

                                                                        224KB

                                                                      • memory/5756-169-0x00000165FB0C0000-0x00000165FB0E2000-memory.dmp

                                                                        Filesize

                                                                        136KB

                                                                      • memory/5756-170-0x00000165FAFC0000-0x00000165FAFC8000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/5756-171-0x00000165FAFD0000-0x00000165FAFD8000-memory.dmp

                                                                        Filesize

                                                                        32KB

                                                                      • memory/5756-1-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

                                                                        Filesize

                                                                        2.0MB

                                                                      • memory/5756-9-0x00000165DE340000-0x00000165DE34E000-memory.dmp

                                                                        Filesize

                                                                        56KB

                                                                      • memory/5756-191-0x00007FFDA2A10000-0x00007FFDA2C05000-memory.dmp

                                                                        Filesize

                                                                        2.0MB